Vulnerability Details : CVE-2011-0091
Kerberos in Microsoft Windows Server 2008 R2 and Windows 7 does not prevent a session from changing from strong encryption to DES encryption, which allows man-in-the-middle attackers to spoof network traffic and obtain sensitive information via a DES downgrade, aka "Kerberos Spoofing Vulnerability."
Vulnerability category: BypassGain privilege
Products affected by CVE-2011-0091
- cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_server_2008:r2:*:itanium:*:*:*:*:*
- cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-0091
0.68%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 78 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-0091
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.4
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:P/A:N |
10.0
|
4.9
|
NIST |
CWE ids for CVE-2011-0091
-
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-0091
-
http://www.securityfocus.com/bid/46140
Microsoft Windows Kerberos Encryption Standard Spoofing Vulnerability
-
http://support.avaya.com/css/P8/documents/100127250
ASA-2011-035 (2496930)
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12498
Repository / Oval Repository
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-013
Microsoft Security Bulletin MS11-013 - Important | Microsoft Docs
-
http://www.vupen.com/english/advisories/2011/0326
Webmail | OVH- OVH
-
http://www.securitytracker.com/id?1025048
Windows Kerberos Lets Local Users Gain Elevated Privileges - SecurityTracker
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/64901
Microsoft Windows Kerberos spoofing CVE-2011-0091 Vulnerability Report
Jump to